snakeO2 Posted April 21, 2013 Report Posted April 21, 2013 SEC Consult Vulnerability Lab Security Advisory < 20130417-2 >======================================================================= title: HTTP header injection/Cache poisoning in Oracle WebCenter Sites Satellite Server product: Oracle WebCenter Sites Satellite Server (former FatWire Satellite Server) vulnerable version: 7.6.0 Patch1, 7.6.2, 11.1.1.6.0, 11.1.1.6.1 fixed version: Patch information see sections below CVE: CVE-2013-1509 impact: medium homepage: Oracle and FatWire found: 2012-09-17 by: K. Gudinavicius SEC Consult Vulnerability Lab https://www.sec-consult.com=======================================================================Vendor description:-------------------FatWire Satellite Server is a predecessor product of Oracle WebCenter SitesSatellite Server."Oracle WebCenter Sites Satellite Server enables organizations to deliversegmented, targeted, and dynamically assembled content across global Webproperties with rapid response times and intelligent edge caching to optimizeand speed the delivery of dynamic Web experiences."Source: http://www.oracle.com/us/products/middleware/webcenter/satellite-server/overview/index.htmlVulnerability overview/description:-----------------------------------Due to unsanitized user input it is possible to inject arbitrary HTTP headervalues in certain HTTP responses of the Satellite Server. This can beexploited, for example, to perform session fixation and malicious redirectionattacks via the Set-Cookie and the Refresh headers. Moreover, the SatelliteServer caches these HTTP responses with the injected HTTP header resulting inall further requests to the same resource being served with the poisoned HTTPresponse, while these objects remain in cache.Proof of concept:-----------------An arbitrary header can be injected in the HTTP responses of thedownloadable resources. The values of the blobheadername2 and theblobheadervalue2 URL parameters are user controllable. In the followingexample the Refresh header is injected:http://fatwire/cs/Satellite?blobcol=urldata&blobheadername1=content-type&blobheadername2=Refresh&blobheadervalue1=application/pdf&blobheadervalue2=0;url=http://www.sec-consult.com&blobkey=id&blobnocache=false&blobtable=MungoBlobs&blobwhere=1342534304149&ssbinary=true&site=S08The returned HTTP response will contain the injected Refresh header and itsvalue. Furthermore, the HTTP response will be cached, so the next time userswill be accessing the same downloadable resource using the standard URL, theywill be affected and redirected using the injected Refresh header value.HTTP/1.1 200 OKDate: Thu, 06 Sep 2012 15:59:04 GMTRefresh: 0;url=http://www.sec-consult.comLast-Modified: Thu, 06 Sep 2012 15:54:20 GMTContent-Type: application/pdfConnection: closeContent-Length: 772193Vulnerable / tested versions:-----------------------------The following installation has been tested:* FatWire Satellite Server 7.6.0 Patch1.Vendor contact timeline:------------------------2012-11-26: Contacting vendor through secalert_us@oracle.com2012-11-26: Vendor response, will investigate issues2012-11-27: Investigation ongoing, the following ID assigned: S0321206 - ARBITRARY HTTP HEADER INJECTION/CACHE POISONING IN FATWIRE2013-01-25: S0321206 Issue fixed in main codeline, scheduled for a future CPU2013-04-12: S0321206 is fixed in upcoming CPU on 2013-04-162013-04-16: Oracle releases April 2013 CPU2013-04-17: Public release of SEC Consult advisorySolution:---------Apply latest patches, see:Oracle Critical Patch Update - April 2013Workaround:-----------Advisory URL:-------------https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htmSursa: Oracle WebCenter Sites Satellite Server - HTTP Header Injection Quote